{"id":282,"date":"2025-06-09T01:25:18","date_gmt":"2025-06-09T01:25:18","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cristina-patterson\/?p=282"},"modified":"2025-06-09T01:25:18","modified_gmt":"2025-06-09T01:25:18","slug":"authenticating-authorizing-and-the-cia-triad","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/cristina-patterson\/2025\/06\/09\/authenticating-authorizing-and-the-cia-triad\/","title":{"rendered":"Authenticating, Authorizing, and the CIA Triad"},"content":{"rendered":"Cristina Patterson<br \/>June 1, 2025<br \/>Authenticating, Authorizing, and the CIA Triad<br \/>Three key concepts form the CIA Triad; confidentiality, Integrity, and availability. The model<br \/>creates a basic blueprint for information security within an organization and can help information<br \/>o\ufb03cers in the development of security programs for the organization.<br \/>Understanding the Importance of the CIA Triad<br \/>The CIA (confidentiality, integrity, and availability) triad serves as a standard for organizations<br \/>when developing policies for information security. Confidentiality is the practice of securing<br \/>information from unauthorized access. Integrity focuses on maintaining the accuracy and<br \/>trustworthiness of data by preventing unapproved changes, even if they are accidental.<br \/>Availability ensures that critical operating systems are accessible when needed, minimizing<br \/>disruption of the ordinary course of business. Together, these three principles guise the<br \/>development of security policies, strategies to minimize risk, and technical controls that help<br \/>control organizations from cyber attacks and threats.<br \/>Understanding the Di\ufb00erence Between Authentication and<br \/>Authorization<br \/>Authentication and Authorization are two essential but di\ufb00erent functions in cybersecurity.<br \/>Authentication verifies the identity of a user or system- confirming they are who they claim to be.<br \/>This can include credentials like passwords or multifactor authentication. In contrast,<br \/>authorization grants permission to a user or system specifying what actions they are allowed to<br \/>carry out. So a user may be able to log into a computer at the organization using their<br \/>credentials, however, their access levels can be limited depending on their function at the<br \/>company.<br \/>Conclusion<br \/>In conclusion the CIA triad- Confidentiality, Integrity, and Availability forms a solid foundation for<br \/>competent cyber security practices. By incorporating the three, organizations can expect to have<br \/>sensitive data safeguarded, ensure availability of their operating systems, and defend against<br \/>cyber threats.<br \/>References<br \/>GeeksforGeeks. (n.d). Di\ufb00erence between authentication and authorization.<br \/>https:\/\/www.geeksforgeeks.org\/di\ufb00erence-between-authentication-and-authorization\/","protected":false},"excerpt":{"rendered":"<p>Cristina PattersonJune 1, 2025Authenticating, Authorizing, and the CIA TriadThree key concepts form the CIA Triad; confidentiality, Integrity, and availability. The modelcreates a basic blueprint for information security within an organization and can help informationo\ufb03cers in the development of security programs for the organization.Understanding the Importance of the CIA TriadThe CIA (confidentiality, integrity, and availability) triad&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/cristina-patterson\/2025\/06\/09\/authenticating-authorizing-and-the-cia-triad\/\">Read More<\/a><\/div>\n","protected":false},"author":30973,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/cristina-patterson\/wp-json\/wp\/v2\/posts\/282"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/cristina-patterson\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/cristina-patterson\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cristina-patterson\/wp-json\/wp\/v2\/users\/30973"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cristina-patterson\/wp-json\/wp\/v2\/comments?post=282"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/cristina-patterson\/wp-json\/wp\/v2\/posts\/282\/revisions"}],"predecessor-version":[{"id":284,"href":"https:\/\/sites.wp.odu.edu\/cristina-patterson\/wp-json\/wp\/v2\/posts\/282\/revisions\/284"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/cristina-patterson\/wp-json\/wp\/v2\/media?parent=282"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cristina-patterson\/wp-json\/wp\/v2\/categories?post=282"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cristina-patterson\/wp-json\/wp\/v2\/tags?post=282"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}